SlideShare ist ein Scribd-Unternehmen logo
1 von 6
PALM VEINTECHNOLOGY
-- (TOUCHING THE PERFECTION)
Submitted by
k.teja vihar vijay kanth
10e81a0499 10e81a04b5
saitejagty@gmail.com
lll-ECE
alfa collegeofeng& tech
CONTENTS
1. ABSTRACT 1
2. INTRODUCTION2
3. PALM VIEW TECHNOLOGY
REVIEWS 2
i) Basis of Palm Vein Technology
ii) Palm Vein Registration
iii) Working of Palm Vein Systems
iv) How Secure is the Technology?
v) What happens if Registered Palm is
damaged?
vi) Contact less palm vein
authentication device
4. ADVANTAGES 6
5. APPLICATIONS 6
i) ATM
ii) Personal Computers
iii) Hospitals and Libraries
iv) Authentication
6. CONCLUSION 8
7. REFERENCES 8
ABSTRACT:
With the increase in technology threat to
personal data and national security had
also increased .The methods that were
developed to secure important information
from
outside intervention were not up to safe
mark .There was a need to introduce a
technology
that secures our data more efficiently from
unlawful intervention .
Fujitsu has developed a palm vein pattern
authentication technology that uses
vescular patterns as personal identification
data .Vein recognition technology is secure
because the authentication data exists inside
the body and is therefore very difficult to
forge. It is highly accurate. This technology
can be used in various fields like banking,
hospitals, government offices, in passport
issuing etc. Business growth will be
achieved
with these solutions by reducing the size of
the palm vein sensor and shortening the
authentication time. This paper is about the
palm vein technology, its applications, how
this technology is applied in real time
applications and the advantages of using this
technology.
2. Introduction:
Page | 4
In the ubiquitous network society, where
individuals can easily
access their information any time and
anywhere, people are also faced with the
risk that
others can easily access the same
information anytime and anywhere. Because
of this
risk, personal identification technology is
used which includes Passwords, personal
identification numbers and identification
cards. However, cards can be stolen and
passwords and numbers can be guessed or
forgotten. To solve these problems, Fujitsu
developed four methods: fingerprints, faces,
voice prints and palm veins. Among these,
because of its high accuracy, contact less
palm vein authentication technology is being
incorporated into various financial solution
products for use in public places. This paper
palm vein authentication technologies and
some examples of its application to financial
solutions.
3. Palm Vein TechnologyReviews:
3.1 The Basis of Palm Vein Technology
An individual first rests his wrist, and on
some
devices, the middle of his fingers, on the
sensor's supports
such that the palm is held centimeters above
the device's
scanner, which flashes a near-infrared ray on
the palm.
Unlike the skin, through which near-infrared
light passes,
deoxygenated hemoglobin in the blood
flowing through the veins absorbs near-
infrared
rays, illuminating the hemoglobin, causing it
to be visible to the scanner. Arteries and
capillaries, whose blood contains
oxygenated hemoglobin, which does not
absorb nearinfrared
light, are invisible to the sensor. The still
image captured by the camera, which
photographs in the near-infrared range,
appears as a black network, reflecting the
palm's
vein pattern against the lighter background
of the palm.
An individual's palm vein image is
converted by algorithms into data points,
which is then compressed, encrypted, and
stored by the software and registered along
with the other details in his profile as a
reference for future comparison. Then, each
time a
person logs in attempting to gain access by a
palm scan to a particular bank account or
secured entryway, etc., the newly captured
image is likewise processed and compared
to
the registered one or to the bank of stored
files for verification, all in a period of
seconds.
Numbers and positions of veins and their
crossing points are all compared and,
depending
on verification, the person is either granted
or denied access.
3.2 REGISTERING THROUGH
PALM VEIN TECHNOLOGY:
Step 1:
Palm vein authentication technology
consists of a small
Palm vein scanner that's easy and natural to
use, fast and
Highly accurate. Simply hold your palm a
few centimeters
Over the scanner and within a second it
reads your unique
vein pattern. A vein picture is taken and
palm pattern is
registered.
Step 2:
The registered palm pattern is stored into the
database along with the personal details
of the client.
3.3 Working of palm vein security
systems
1. One should place his/her palm near to
scanner.
2. The scanner makes use of a special
characteristic of the reduced hemoglobin
coursing
through the palm veins — it absorbs near-
infrared light. This makes it possible to take
a snapshot of what's beneath the outer skin,
something very hard to read or steal.
3. The integrated optical system in the palm
vein sensor uses this phenomenon to
generate
an image of the palm vein pattern and the
generated image is digitized, encrypted and
finally stored as a registered template in the
database.
3.4 How Secure is the Technology?
On the basis of testing the technology on
more than 70,000 individuals ,
Fujitsu declared that the new system had a
false rejection rate of 0.01% (i.e., only one
out of 10,000 scans were incorrect denials
for access), and a false acceptance rate of
less
than 0.00008% (i.e., incorrect approval for
access in one in over a million scans).
Also, if your profile is registered with your
right hand, don't log in with your left - the
patterns of an individual's two hands differ.
And if you registered your profile as a child
, it'll still be recognized as you grow, as an
individual's patterns of veins are
established in utero (before birth). No two
people in the world share a palm vein
pattern - even those of identical twins differ.
In addition the devices ability to perform
personal authentication was verified using
the following:
1. Data from people ranging from 6 to 85
years old including people in various
occupations in accordance with the
demographics realized by the Statistics
Center of the
Statistics Bureau.
2. Data about foreigners living in Japan in
accordance with the world demographics
released by the United Nations.
3. Data taken in various situations in daily
life including after drinking alcohol, taking a
bath, going outside and waking up.
3.5. What happens if the registered
palm gets damaged?
There may be a chance that the palm we had
registered may get
damaged then we cannot use this
technology, so during the time of
registration we take
the veins of both the hands so that if one
gets damaged we can access through the
second
hand. When hand get damaged up to large
extent we can get veins because deeper into
the
hand veins are obtained.
When we apply this method we can
maintain complete privacy .
3.6. Contactless palm vein
authentication device
(HYGIENE CONCERN):
The completely contactless feature of this
Device makes it suitable for use where high
levels of
hygiene are required .It also eliminates any
hesitation people
might have about coming into contact with
something that
other people have already touched. Fig:3.6
Contact less
Sensor
In addition to being contactless and thereby
hygienic and user-friendly in
that the user does not need to physically
touch a surface and is free of such hygiene
concerns, palm vein authentication is highly
secure in that the veins are internal to the
body and carry a wealth of information,
thereby being extremely difficult to forge.
4. ADVANTAGES:
In addition to the palm, vein authentication
can be done using the
vascular pattern on the back of a hand or a
finger. However, the palm vein pattern is the
most complex and covers the widest area,
because the palm has no hair, it is easier to
photograph its vascular pattern. The palm
also has no significant variations in skin
color compared with fingers or back of the
hand, where the color can darken in certain
areas.
5. APPLICATIONS:
This palm vein authentication technology is
used in various areas for
more security. The following are some of
the important areas where it is used:
5.1. ATM:
In July 2004, to ensure customer security,
Suruga bank launched its“Bio
Security Deposit” the world’s first financial
service to use Palm Secure . This service
features high security for customers using
vein authentication , does not require a
bank card or pass book and prevents
withdrawals from branches other than the
registered branch and ATMs thereby
minimizing the risk of fraudulent
withdrawals.
To open a Bio-Security Deposit account,
customers go to a bank and have their palm
veins photographed at the counter in order to
guarantee secure data management, the
palm vein data is stored only on the vein
data base server at the branch office where
the
account is opened..
In October 2004, The Bank of Tokyo
launched its “Super –IC Card”. This card
combines the functions of a bankcard, credit
card, electronic money and palm vein
authentication. This Super –IC Card
contains the customer’s palm
Vein data and vein authentication algorithms
and performs vein
authentication by itself . This system is
advantageous because
the customers information is not stored at
the bank. When a
Customer applies for a Super –IC Card, the
bank sends the card
to the customers home . To activate the palm
vein authentication function, the
customer brings the card and his passbook
and seal to the bank
counter where the customers vein
information is registered on
the card . After registration the customer can
make transactions at that branch counter
and ATM using palm vein authentication
and a matching PIN number
5.2. PERSONAL COMPUTERS:
In personal computers palm vein technology
can applied by inserting the vein sensor
inside mouse.
when power is supplied to system the mouse
also gets
power and the sensor in the mouse will be
ready to sense
palm veins. When one place his/her palm the
sensor sense
the veins and if they are matched with the
registered ones Fig:5.2 PC Sensor
the system allows the person to use it.
One can use this technology even to lock
folders , that should be
maintained as private information.
5.3. IN HOSPITALS AND LIBRARYS:
A public library in Japan is set to
become the first in the world to use palm-
vein biometrics
as a substitute for conventional library cards.
The University of Tokyo hospital has taken
delivery of a
contactless palm vein authentication system
to secure physical access to its
Department of Planning, Information and
Management.
5.4 Authentication:
In front of our homes we can apply
this Palm vein techonolgy so that by
registering the veins
of our family members and relatives we can
maintain high
range security which is not possible through
other
technologies . Japanese recently used this
technologies
before front doors and getting high range
security.
Fig:5.4 Near Front Doors
6. Conclusion:
Palm vein pattern authentication technology
developed by Fujitsu
was being used in a wide range in japan . If
this technology is introduced in our country
we can solve many problems such as
password protection in ATM ,
security in various fields and if we
implement this technology in government
offices
we can make the employees to work
according the government timings.surely
this
technology will bring a revolution in the
field of science and technology in the near
future.
7. REFERENCES:
1.
WWW.ZENGINKYO.OR.JP/EN/NEWS/IN
DEX
2. www.btm.co.jp/english/index.html
3. WWW.networkworld.COM

Weitere ähnliche Inhalte

Was ist angesagt?

Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein pptvedabobbala
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyManav Mittal
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technologyDinesh Ediga
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication techniqueViraj Rajopadhye
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein TechnologySai Divya
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology bhoovi1239
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein TechnologyPapun Papun
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYSagar Pudi
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmalAkmal Hussain
 
Palm vein new
Palm vein newPalm vein new
Palm vein newRohit Kumar
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technologysathyakawthar
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology Anurag Chitti
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technologyBhavin Solanki
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptxschetan202
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 

Was ist angesagt? (20)

Palmvein ppt
Palmvein pptPalmvein ppt
Palmvein ppt
 
Palm vein-technology.doc
Palm vein-technology.docPalm vein-technology.doc
Palm vein-technology.doc
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Plam vein technology
Plam vein technologyPlam vein technology
Plam vein technology
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication technique
 
Palmvein Technology
Palmvein TechnologyPalmvein Technology
Palmvein Technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
PALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGYPALM VEIN TECHNOLOGY
PALM VEIN TECHNOLOGY
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Palm vein new
Palm vein newPalm vein new
Palm vein new
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptx
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 

Ă„hnlich wie Palm Vein Authentication: A Secure Biometric Technology

Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest pptvishesh2969
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide infoKalyanam Kiran
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEJournal For Research
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authenticationKumar Goud
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...IJECEIAES
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric Systemijtsrd
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIJTET Journal
 
Computer science ppt
Computer science pptComputer science ppt
Computer science pptbrijesh kumar
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologySudip Sadhukhan
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsIOSR Journals
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
Fingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comFingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comwww.mairsturnstile.com
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationgagana5017
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1ehab_madda
 

Ă„hnlich wie Palm Vein Authentication: A Secure Biometric Technology (20)

palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUEPALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
PALM VEIN AUTHENTICATION USING IMAGE CLASSIFICATION TECHNIQUE
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
H029044050
H029044050H029044050
H029044050
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Fingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comFingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.com
 
Biometrics
BiometricsBiometrics
Biometrics
 
Palm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentationPalm Vein Technology ppt.pptx IEEE presentation
Palm Vein Technology ppt.pptx IEEE presentation
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 

Mehr von Chitrachedu Dada Kalandar

Mehr von Chitrachedu Dada Kalandar (13)

microcontroller based automation of drip irrigation system
microcontroller based automation of drip irrigation systemmicrocontroller based automation of drip irrigation system
microcontroller based automation of drip irrigation system
 
Tusanami
TusanamiTusanami
Tusanami
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
P 6168--microcontroller based-lpg_gas_detector_using_gsm_module
P 6168--microcontroller based-lpg_gas_detector_using_gsm_moduleP 6168--microcontroller based-lpg_gas_detector_using_gsm_module
P 6168--microcontroller based-lpg_gas_detector_using_gsm_module
 
Microcontroller based automation of drip irrigation system
Microcontroller based automation of drip irrigation systemMicrocontroller based automation of drip irrigation system
Microcontroller based automation of drip irrigation system
 
Wireless
WirelessWireless
Wireless
 
Wireless transmission of electricity – development and possibility
Wireless transmission of electricity – development and possibilityWireless transmission of electricity – development and possibility
Wireless transmission of electricity – development and possibility
 
Solar botanic
Solar botanicSolar botanic
Solar botanic
 
Solar botanic (1)
Solar botanic (1)Solar botanic (1)
Solar botanic (1)
 
Advanced automatic railway system to avoid different train accidents
Advanced automatic railway system to avoid different train  accidentsAdvanced automatic railway system to avoid different train  accidents
Advanced automatic railway system to avoid different train accidents
 
5g tech
5g tech5g tech
5g tech
 
5 g mobile technology
5 g mobile technology5 g mobile technology
5 g mobile technology
 
an advance approach to divert trafiic at busy signals using rfid technolgy
an advance approach to divert trafiic at busy signals using rfid technolgyan advance approach to divert trafiic at busy signals using rfid technolgy
an advance approach to divert trafiic at busy signals using rfid technolgy
 

KĂĽrzlich hochgeladen

Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...Amil Baba Dawood bangali
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESNarmatha D
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

KĂĽrzlich hochgeladen (20)

Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIES
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

Palm Vein Authentication: A Secure Biometric Technology

  • 1. PALM VEINTECHNOLOGY -- (TOUCHING THE PERFECTION) Submitted by k.teja vihar vijay kanth 10e81a0499 10e81a04b5 saitejagty@gmail.com lll-ECE alfa collegeofeng& tech
  • 2. CONTENTS 1. ABSTRACT 1 2. INTRODUCTION2 3. PALM VIEW TECHNOLOGY REVIEWS 2 i) Basis of Palm Vein Technology ii) Palm Vein Registration iii) Working of Palm Vein Systems iv) How Secure is the Technology? v) What happens if Registered Palm is damaged? vi) Contact less palm vein authentication device 4. ADVANTAGES 6 5. APPLICATIONS 6 i) ATM ii) Personal Computers iii) Hospitals and Libraries iv) Authentication 6. CONCLUSION 8 7. REFERENCES 8 ABSTRACT: With the increase in technology threat to personal data and national security had also increased .The methods that were developed to secure important information from outside intervention were not up to safe mark .There was a need to introduce a technology that secures our data more efficiently from unlawful intervention . Fujitsu has developed a palm vein pattern authentication technology that uses vescular patterns as personal identification data .Vein recognition technology is secure because the authentication data exists inside the body and is therefore very difficult to forge. It is highly accurate. This technology can be used in various fields like banking, hospitals, government offices, in passport issuing etc. Business growth will be achieved with these solutions by reducing the size of the palm vein sensor and shortening the authentication time. This paper is about the palm vein technology, its applications, how this technology is applied in real time applications and the advantages of using this technology. 2. Introduction: Page | 4 In the ubiquitous network society, where individuals can easily access their information any time and anywhere, people are also faced with the risk that others can easily access the same information anytime and anywhere. Because of this risk, personal identification technology is used which includes Passwords, personal identification numbers and identification cards. However, cards can be stolen and
  • 3. passwords and numbers can be guessed or forgotten. To solve these problems, Fujitsu developed four methods: fingerprints, faces, voice prints and palm veins. Among these, because of its high accuracy, contact less palm vein authentication technology is being incorporated into various financial solution products for use in public places. This paper palm vein authentication technologies and some examples of its application to financial solutions. 3. Palm Vein TechnologyReviews: 3.1 The Basis of Palm Vein Technology An individual first rests his wrist, and on some devices, the middle of his fingers, on the sensor's supports such that the palm is held centimeters above the device's scanner, which flashes a near-infrared ray on the palm. Unlike the skin, through which near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near- infrared rays, illuminating the hemoglobin, causing it to be visible to the scanner. Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb nearinfrared light, are invisible to the sensor. The still image captured by the camera, which photographs in the near-infrared range, appears as a black network, reflecting the palm's vein pattern against the lighter background of the palm. An individual's palm vein image is converted by algorithms into data points, which is then compressed, encrypted, and stored by the software and registered along with the other details in his profile as a reference for future comparison. Then, each time a person logs in attempting to gain access by a palm scan to a particular bank account or secured entryway, etc., the newly captured image is likewise processed and compared to the registered one or to the bank of stored files for verification, all in a period of seconds. Numbers and positions of veins and their crossing points are all compared and, depending on verification, the person is either granted or denied access. 3.2 REGISTERING THROUGH PALM VEIN TECHNOLOGY: Step 1: Palm vein authentication technology consists of a small Palm vein scanner that's easy and natural to use, fast and Highly accurate. Simply hold your palm a few centimeters Over the scanner and within a second it reads your unique vein pattern. A vein picture is taken and palm pattern is registered. Step 2: The registered palm pattern is stored into the database along with the personal details of the client. 3.3 Working of palm vein security systems 1. One should place his/her palm near to scanner. 2. The scanner makes use of a special characteristic of the reduced hemoglobin coursing
  • 4. through the palm veins — it absorbs near- infrared light. This makes it possible to take a snapshot of what's beneath the outer skin, something very hard to read or steal. 3. The integrated optical system in the palm vein sensor uses this phenomenon to generate an image of the palm vein pattern and the generated image is digitized, encrypted and finally stored as a registered template in the database. 3.4 How Secure is the Technology? On the basis of testing the technology on more than 70,000 individuals , Fujitsu declared that the new system had a false rejection rate of 0.01% (i.e., only one out of 10,000 scans were incorrect denials for access), and a false acceptance rate of less than 0.00008% (i.e., incorrect approval for access in one in over a million scans). Also, if your profile is registered with your right hand, don't log in with your left - the patterns of an individual's two hands differ. And if you registered your profile as a child , it'll still be recognized as you grow, as an individual's patterns of veins are established in utero (before birth). No two people in the world share a palm vein pattern - even those of identical twins differ. In addition the devices ability to perform personal authentication was verified using the following: 1. Data from people ranging from 6 to 85 years old including people in various occupations in accordance with the demographics realized by the Statistics Center of the Statistics Bureau. 2. Data about foreigners living in Japan in accordance with the world demographics released by the United Nations. 3. Data taken in various situations in daily life including after drinking alcohol, taking a bath, going outside and waking up. 3.5. What happens if the registered palm gets damaged? There may be a chance that the palm we had registered may get damaged then we cannot use this technology, so during the time of registration we take the veins of both the hands so that if one gets damaged we can access through the second hand. When hand get damaged up to large extent we can get veins because deeper into the hand veins are obtained. When we apply this method we can maintain complete privacy . 3.6. Contactless palm vein authentication device (HYGIENE CONCERN): The completely contactless feature of this Device makes it suitable for use where high levels of hygiene are required .It also eliminates any hesitation people might have about coming into contact with something that other people have already touched. Fig:3.6 Contact less Sensor In addition to being contactless and thereby hygienic and user-friendly in that the user does not need to physically touch a surface and is free of such hygiene concerns, palm vein authentication is highly secure in that the veins are internal to the body and carry a wealth of information, thereby being extremely difficult to forge.
  • 5. 4. ADVANTAGES: In addition to the palm, vein authentication can be done using the vascular pattern on the back of a hand or a finger. However, the palm vein pattern is the most complex and covers the widest area, because the palm has no hair, it is easier to photograph its vascular pattern. The palm also has no significant variations in skin color compared with fingers or back of the hand, where the color can darken in certain areas. 5. APPLICATIONS: This palm vein authentication technology is used in various areas for more security. The following are some of the important areas where it is used: 5.1. ATM: In July 2004, to ensure customer security, Suruga bank launched its“Bio Security Deposit” the world’s first financial service to use Palm Secure . This service features high security for customers using vein authentication , does not require a bank card or pass book and prevents withdrawals from branches other than the registered branch and ATMs thereby minimizing the risk of fraudulent withdrawals. To open a Bio-Security Deposit account, customers go to a bank and have their palm veins photographed at the counter in order to guarantee secure data management, the palm vein data is stored only on the vein data base server at the branch office where the account is opened.. In October 2004, The Bank of Tokyo launched its “Super –IC Card”. This card combines the functions of a bankcard, credit card, electronic money and palm vein authentication. This Super –IC Card contains the customer’s palm Vein data and vein authentication algorithms and performs vein authentication by itself . This system is advantageous because the customers information is not stored at the bank. When a Customer applies for a Super –IC Card, the bank sends the card to the customers home . To activate the palm vein authentication function, the customer brings the card and his passbook and seal to the bank counter where the customers vein information is registered on the card . After registration the customer can make transactions at that branch counter and ATM using palm vein authentication and a matching PIN number 5.2. PERSONAL COMPUTERS: In personal computers palm vein technology can applied by inserting the vein sensor inside mouse. when power is supplied to system the mouse also gets power and the sensor in the mouse will be ready to sense palm veins. When one place his/her palm the sensor sense the veins and if they are matched with the registered ones Fig:5.2 PC Sensor the system allows the person to use it. One can use this technology even to lock folders , that should be maintained as private information. 5.3. IN HOSPITALS AND LIBRARYS: A public library in Japan is set to become the first in the world to use palm- vein biometrics as a substitute for conventional library cards. The University of Tokyo hospital has taken delivery of a
  • 6. contactless palm vein authentication system to secure physical access to its Department of Planning, Information and Management. 5.4 Authentication: In front of our homes we can apply this Palm vein techonolgy so that by registering the veins of our family members and relatives we can maintain high range security which is not possible through other technologies . Japanese recently used this technologies before front doors and getting high range security. Fig:5.4 Near Front Doors 6. Conclusion: Palm vein pattern authentication technology developed by Fujitsu was being used in a wide range in japan . If this technology is introduced in our country we can solve many problems such as password protection in ATM , security in various fields and if we implement this technology in government offices we can make the employees to work according the government timings.surely this technology will bring a revolution in the field of science and technology in the near future. 7. REFERENCES: 1. WWW.ZENGINKYO.OR.JP/EN/NEWS/IN DEX 2. www.btm.co.jp/english/index.html 3. WWW.networkworld.COM